Solved

Failed domain controller still listed as DNS server

Posted on 2016-07-26
6
26 Views
Last Modified: 2016-07-26
Hello Experts,

I have two servers:

PDC = Server 2008 R2 = 'Server1' = 10.0.0.1
BDC = Server 2003 - 'Server2' = 10.0.0.2

there used to be another, which failed completely (replaced by Server 2008R2)
PDC = Server 2003 = 'Server3' = 10.0.0.3

The FSMO roles were successfully transferred and all of the ADUC, ADSS, DNS entries were cleaned up to remove Server3 as per MS documentation, however when I do an NSLOOKUP of the internal domain from any of the servers and PCs on the network, the IP address of the failed 'Server3' is still listed.

Can anyone suggest where else I should check for references to this server?  

Thank you in advance!
0
Comment
Question by:fourthgen
6 Comments
 
LVL 13

Expert Comment

by:cshepfam
ID: 41729589
When you looked in DNS, did you look in the Name Servers?  If it was a DC, you can't just remove the A record, you have to go into the Name Servers and remove that instance.

Also, did you demote it correctly?  If not then there may still be metadata in place.  You can go in Sites and Services and check to see if the DC is located in there.
0
 

Author Comment

by:fourthgen
ID: 41729601
Hello cshepfam,

Yes, have removed entries from Name Servers tab in DNS.
No chance to demote it due to catastrophic RAID failure; Sites and Services has all been cleaned up according to MS documentation such as example below:

https://technet.microsoft.com/en-us/library/cc816907(WS.10).aspx?tduid=(431f15b053b4881b86cc0c79e79b7f0c)(256380)(2459594)(TnL5HPStwNw-RPn6XNAhuR1Fyrw3vxDS0A)()
0
 
LVL 40

Accepted Solution

by:
footech earned 500 total points
ID: 41729617
If the command you're running is something like
nslookup yourdomain.com
Then those results are returned by any records in the zone yourdomain.com that appear with a name "same as parent".  Those records are used to lookup a DC when a service is not site-aware (can't use the DCLocator process).  So look for a "same as parent" A record with the IP of your failed DC.
1
NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

 
LVL 16

Expert Comment

by:FOX
ID: 41729644
Have you checked for the entry in reverse lookups in your DNS as well?
0
 

Author Closing Comment

by:fourthgen
ID: 41729664
Excellent, sorted! - I must've missed this several times when combing through the DNS entries as it didn't reference the server by name.

Thank you footech.
0
 
LVL 40

Expert Comment

by:footech
ID: 41729701
Glad to help.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DNS Issues With Machines 2 35
Remote desktop connection frequent connection lost 5 45
Exchange Server Send connector and DNS Round Robin ? 6 38
DNS/WINS in a domain 10 37
Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question